Links

Webserver scanning

Common wordlists

General
  • /usr/share/seclists/Discovery/Web-Content/common.txt
  • /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
CGI
  • /usr/share/seclists/Discovery/Web-Content/CGIs.txt
SharePoint
  • /usr/share/wordlists/SecLists/Discovery/Web_Content/sharepoint.txt

gobuster

GitHub - OJ/gobuster - Directory/File, DNS and VHost busting tool written in Go
gobuster dir -w /usr/share/seclists/Discovery/Web-Content/common.txt -s '200,204,301,302,307,403,500' -e -o gobuster -t 50 -u <host>

File extensions

IIS
-x 'asp, aspx, html, txt'
Apache / nginx
-x 'php, cgi, jsp, html, txt'

wfuzz

GitHub - xmendez/wfuzz - Web application fuzzer
wfuzz -w <wordlist-file> —-hc 404 <host>/FUZZ/FUZ2Z
wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/common.txt --sh BBB <host>/file.php?param=FUZZ

fuff

Fast web fuzzer written in Go. fuff
Enumerate usernames
ffuf -w <wordlist-file> -X POST -d "email=FUZZ&password=x" -H "Content-Type: application/x-www-form-urlencoded" -u <url> -mr "email already exists"
Brute force passwords
ffuf -w emails.txt:W1,<password-file>:W2 -X POST -d "email=W1&password=W2" -H "Content-Type: application/x-www-form-urlencoded" -u <url> -fc 200

nikto

GitHub - sullo/nikto - Web server scanner
nikto -h <ip> -Format txt -o .

dotdotpwn

GitHub - wireghoul/dotdotpwn - The Directory Traversal Fuzzer
dotdotpwn -m http -h <ip> -f <file>
dotdotpwn -m http-url -u http://<ip>/nav.php?page=TRAVERSAL -o unix -s -d 4 -k "root:" -f /etc/passwd

dirb

DIRB is a Web Content Scanner. It looks for existing (and/or hidden) Web Objects. It basically works by launching a dictionary based attack against a web server and analyzing the response.
dirb <host> -o dirb

DirBuster

DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers.
dirbuster

Web application firewall (WAF) detection

You can use wafw00f to detect web application firewalls (WAFs).
wafw00f <url>

wappalyzer (firefox add-on)